200425691 玖、發明說明: 【發明所屬之技術領域】 本發明係有關於行動通信技術,更特言之,係關於一種 用來強制執行一應中斷的機制’該應中斷的機制係用於傳送 訊息給一具有臨時性網路位址的無線裝置。 【先前技術】 計算技術已經根本改變人們工作和娛樂的方式,且對人 類的進展有巨大地貢獻。現電腦可協助無數應用,例如文字 處理、電腦模擬、高階遊戲比赛、聲音辯識等等。現計算系 統以廣泛各種不同的形式出現,包括,例如,桌上型電腦、 膝上型電腦、個人數位助理(PDAs),及甚至行動電話和裝置。 一些行動無線裝置例如個人數位助理和無線電話具有 複雜s己憶體及一般處理能力’其讓行動裝置執行許多以前由 較大的桌上型電腦所執行的任務。這些任務可甚至包括在資 料網路上必要的通信任務,甚至當使用者是行動的時候,從 而允許他們存取網際網路且執行電子郵件。 一般而言,使用兩個主要傳輸層協定含有網際網路通訊 協定(IP protocol)。 一稱為傳輸控制協定(TCP)。 IP protocol僅僅處理封包的遞送,而TCP使兩個計算系統能夠 建立一連線並可靠地交換資料。TCP保證以送出資料的相 同順序將它傳送。另一主要傳輸層協定是使用者資料訊息協 定(UDP),其不在一送出和接收的計算系統之間建立一連 線。並且,UDP提供很少的錯誤控制。因為UDP不在兩個 3 200425691 通訊 連線 網路 要改 網路 位址 置。 公共 新指 送到 線裝 回應 無線 機制 境。 【發 關於 無線 制。1 計算系統之間涉及一已建立的連線,UDP經常稱作“無 協定”。其他無連線協定包括,例如,乙太網路和網際 封包交換(IPX)。 不管使用的特定協定如何,一行動無線裝置可能經常需 變它的位址。例如,當在以Ip為基礎的無線通訊載波 上,一無線裝置可與無線網路分開,從而強制執行Ip 的一非關聯性,該IP位址是當連線時可識別該無線裝 此外,甚至當連線到通訊載波網路時,無線裝置可從一 轉換交換數據網路(PSDN)移至另一者藉以強制執行重 派一與無線裝置關聯的IP位址的動作。 於是’如果無線裝置要在無線通訊载波網路上將一訊息 接收計算系統,則當有對一訊息的回應回傳時,該對無 置之網路位址的指派也許已經作廢,從而導致無法傳遞 。還更糟的是,也許已經將舊網路位址指派給傳送另一 裝置,導致無線裝置錯誤傳遞這個回應。 於是,所想要的是在一無線環境中作為更可靠的通訊之 ’而將網路位址只臨時性指派給無線裝置的一無線環 明内容】 上述含先前技藝狀態的問題由本發明的原理克服,其係 當在一通訊載波網路上將訊息送給無線裝置時,對於一 裝置強制執行一應中斷時間(a time-to-disconnect)之機 亥機制可防止由於此無線裝置與一先前位址的非關聯性 4 200425691 而可能產生的對此訊息(或甚至其他非相關的訊息)之回應 的誤傳。 無線裝置建構一訊息,其在下文稱作為一 “回本地訊息 (inbound message)” ,因這訊息就接收計算系統而論將是回 本地的。此回本地訊息包括至少間接地表示一應中斷時間之 資料攔位》例如,此應中斷時間可能清楚地陳述或也許基 於資料攔位的内容暗示。此應中斷時間是在任何向外的訊息 不被快遞給無線裝置,此無線裝置使用關聯於應中斷時間之 。亥Em時性網路位址。此無線裝置對通訊載波網路建立一連 線’如果尚未建立一連線,則將這回本地訊息在通訊載波網 路上快遞到此接收計算系統。無線裝置保持此連線直到應 中斷時間期滿。然後,如果應中斷時間沒被延伸,無線裝 置可斷開。當斷開時,指派給無線裝置的臨時性網路位址 將作廢。 虽從通訊載波網路上的無線裝置接收這回本地訊息 時,接收計算系統由,例如讀取和解釋在回本地訊息中所包 括的k料攔位,而識別無線裝置之應中斷時間。當接收計 算系統要送回一向外的訊息(〇utb〇und则““㊁)時(例如對 回本地訊息的一回應),接收計算系統判定應中斷時間是否 已經超過,若沒超過應中斷時間,則快遞此向外的訊息到該 使用臨時指定位址之無線裝置。 如果無線裝置試圖保持連線,從而使其具有相同的臨時 性網路位址直到至少該所指定應中斷時間,以及如果這系統 仍然在所指定應中斷時間之前,則接收計算系統僅僅使用該 5 200425691 臨時性網路位址送出向外的訊息,相較於不考慮應中斷時間 而言,無線裝置很可能將收到此向外的訊息。 如果應中斷時間已經超過,此接收計算系統可等待這無 線裝置再次連線,然後送出這(些)向外的訊息。此接收計 算系統也可試圖將這(些)向外的訊息送給使用選擇另一傳 輸機制的無線裝置,該另一傳輸機制是不同於無線裝置本來 慣常送出這回本地訊息的傳輸機制。例如,如果無線農置 使用在網際網路通訊協定上的UDP送出此回本地訊息,可 使用短本文訊息服務(SMS)傳回這回應。 在後續的描述中將說明本發明的附加特點和優點,並且 部分從描述當中將顯而易見,或可由本發明的實踐來學習。 本發明的特點和優點可藉由在這些附加的申請專利範園中 這些儀器設備及結合特別指出而認識和獲得本發明的特.點 和優點。本發明的這些和其他特點將從下面的描述和附力口 的申請專利範圍當中變成更加完全明顯,或如以下所說明, 可由本發明的實踐來學習。 【實施方式】 本發明的原理涉及一無線裝置,其建構一包括一應中斷 時間之一表不法的訊息’且在一通訊載波網路上將這訊息傳 給一接收計算系統。那個訊息將被稱作“回本地”訊息,因 該訊息從接收計算系統的觀點是回本地的。應中斷時間指 示一超過時間的此接收計算系統不應該送出任何使用臨時 性網路位址之向外的訊息(例如,對回本地訊息的一回應), 6 200425691 在傳送此回本地訊息的時候,將該臨時性網路位址指派給無 線裝置。該無線裝置試圖保持連線從而保留該位址直到應 中斷時間期滿。當向外的訊息準備送回時,如果應中斷時間 尚未到,將這向外的訊息送給無線裝置,其使用在無線裝置 送出這回本地訊息的時候具有的相同網路位址。否則,如 果超過應中斷時間’則接收計算系統不企圖使用那個網路位 址之向外的訊息傳輸。而是,此接收計算系統可等待從無 線裝置的下一次連線,或可試圖送出使用另一選擇的傳輸機 制之向外的訊息。 在本發明範圍之内的實施例,包括電腦可讀取的媒體用 以攜帶或具有電腦可執行的指令或在其上所儲存的資料結 構。這樣電腦可讀取的媒體能夠由一個一般用途或特殊用途 的電腦存取之任何可用的媒體。透過例子,而不局限性, 這樣電腦可讀取的媒體能包含實體電腦可讀取的媒體例如 隨機存取記憶體(RAM)、唯讀存取記憶體(r0M)、電子式_ 可抹除可程式化唯讀記憶體(EEPROM)、唯讀光碟(CD-ROM) 或者其他的光碟儲存、磁碟儲存或其他磁儲存裝置,或任何 其他能夠以電腦可執行的指令或資料結構的形式用來播帶 或儲存這想要的程式碼裝置之其他媒體,以及能夠由一個一 般用途或特殊用途的電腦存取之任何其他媒體。 當在一網路或另一通信連線(硬體連線、無線,或硬體 連線或無線的結合之任一者)上傳送或提供資訊給一電腦, 此電腦將這連線適當地視為一電腦可讀取的媒體。因此, 適當地將任何這樣的一連線命名為一電腦可讀取的媒體。在 7 電腦可讀取的媒體範圍之内也應該包括上面所述的組合。電 腦可執行的指令包含,例如,使一般用途電腦、特殊用途電 腦,或特殊用途處理裝置以執行一某種功能或功能組的任何 指令和資料。電腦可執行的指令也許是,例如,二進制、居 中的格式例如組合語言,或甚至原始碼。 第1圖和下面的时論企圖提供一簡短的、一般描述可實 作本發明的一合適計算環境。雖然不是必要,但是在電腦 玎執行的指令之一般環境條件中將描述本發明,例如程式模 組,其由電腦系統所執行。通常,程式模組包括常式、程 式、物件、元件、資料結構,等等,其執行特定任務或實作 特定抽象資料的類型。電腦可執行的指令,其關聯於資料結 構,以及這些程式模組表示用於執行在這裡所揭露的方法動 作之程式碼裝置的例子。 關於第1圖,用於本發明原理的一合適的作業環境包括 以一電腦系統1 00的形式之一般用途電腦系統。電腦系統 1 00也許是例如已適用於執行在這裡所揭露的操作之一個 人電腦。 電腦系統100包括一使用者輸入界面170,其從一輸入 裝置接收資訊,如同,例如一鍵盤、麥克風、滑鼠、或,行 動裝置的例子,一觸控墊。一輸入裝置能與使用者輸入界 面17〇耦接以致於使資訊登錄。一輸入裝置可在這樣的一 耦接上傳送資訊以回應輸入裝置的預先程式化資料或使用 者的操控。 電腦系統1 00包括一視訊輸出界面1 50,其對外部的視 8 200425691 頻顯示裝置提供一視訊輸出信號。電腦系統1 〇〇可與一視 訊顯示裝置整合地安置或者與一視訊顯示裝置分離,例如, 舉例而言一彩色或單色電腦監視器。一視訊顯示裝置能與 視訊輸出界面150耦接以致於接收一所提供的視訊輸出信 號。在一行動裝置的例子中,這視訊輸出界面可為一相對 較小的顯示之界面。 同樣地’電腦系統100包括一音訊輸出界面13〇 ,其對 外部音訊輸出裝置提供音頻輸出信號。電腦系統丨00也可 與一音訊系統整合地安置或者與一音訊系統分離,其為可包 括能夠發出聲音資料的一擴音器或其他裝置。能夠使一音頻 系統與音訊輸出界面1 30耦接以致於接收一所提供的音訊 輸出信號。 電腦系統100包括處理單元120,其斟酌複雜和靈活的 元1 20執行所設計的電腦可執 包括本發明的特點。處理單元 其也相互連線包括系統記憶 一般用途處理能力。處理單元 行指令以實作電腦系統1 00 ,包 1 20與系統匯流排11 〇耦接,直 140的各種其他元件200425691 (1) Description of the invention: [Technical field to which the invention belongs] The present invention relates to mobile communication technology, and more specifically, to a mechanism for forcing an interruption. The interruption mechanism is used for transmitting messages. Give a wireless device with a temporary network address. [Previous Technology] Computing technology has fundamentally changed the way people work and play, and it has greatly contributed to human progress. Today's computers can assist in countless applications, such as word processing, computer simulations, high-level game competitions, sound recognition, and more. Today's computing systems come in a wide variety of different forms, including, for example, desktop computers, laptops, personal digital assistants (PDAs), and even mobile phones and devices. Some mobile wireless devices, such as personal digital assistants and wireless phones, have complex memory and general processing capabilities' which allow the mobile device to perform many tasks previously performed by larger desktop computers. These tasks may even include the necessary communication tasks on the data network, even when the user is mobile, thereby allowing them to access the Internet and perform email. Generally speaking, the two main transport layer protocols used include the Internet Protocol (IP protocol). One is called Transmission Control Protocol (TCP). The IP protocol only handles packet delivery, while TCP enables two computing systems to establish a connection and reliably exchange data. TCP guarantees that it will be transmitted in the same order as it was sent. Another major transport layer protocol is the User Data Message Protocol (UDP), which does not establish a connection between a sending and receiving computing system. And, UDP provides very little error control. Because UDP is not on the two 3 200425691 communication connection network, you need to change the network address. Public new instructions were sent to the wire line to respond to the wireless mechanism environment. [Posted on wireless. 1 Computing systems involve an established connection. UDP is often referred to as "no protocol." Other connectionless protocols include, for example, Ethernet and Internetwork Packet Exchange (IPX). Regardless of the specific protocol used, a mobile wireless device may often need to change its address. For example, when an IP-based wireless communication carrier is used, a wireless device can be separated from the wireless network to enforce a non-association of the IP. The IP address can identify the wireless device when connected. In addition, Even when connected to a communication carrier network, a wireless device can be moved from a Switched Switched Data Network (PSDN) to another to force the action of reassigning an IP address associated with the wireless device. So 'if the wireless device wants to receive a message on the wireless communication carrier network, when there is a response to a message, the assignment of the unaddressed network address may have been invalidated, resulting in failure to deliver. . To make matters worse, the old network address might have been assigned to send another device, causing the wireless device to mistransmit this response. Therefore, what is desired is a wireless environment that assigns network addresses to wireless devices only temporarily as a more reliable communication in a wireless environment.] The above-mentioned problem with the state of the art is governed by the principles of the present invention. Overcoming is that when a message is sent to a wireless device on a communication carrier network, a mechanism that enforces a time-to-disconnect for a device can prevent the wireless device from communicating with a previous bit. Addresses of non-relevance 4 200425691 and possible misrepresentations of responses to this message (or even other non-relevant messages). The wireless device constructs a message, which is hereinafter referred to as an "inbound message", because this message will be local to the receiving computing system. The local message this time includes a data block that at least indirectly represents a due time. For example, this due time may be clearly stated or may be implied based on the content of the data block. This outage time is the time during which any outbound messages are not delivered to the wireless device. This wireless device uses the time associated with the outage time. Hai Em Time Network Address. This wireless device establishes a connection to the communication carrier network 'If no connection has been established, the local message will be delivered to the receiving computing system on the communication carrier network. The wireless device maintains this connection until the due time has expired. The wireless device can then be disconnected if the response interruption time is not extended. When disconnected, the temporary network address assigned to the wireless device is invalidated. Although receiving this local message from the wireless device on the communication carrier network, the receiving computing system identifies, for example, the time interval when the wireless device should be interrupted by reading and interpreting the k-blocks included in the local message. When the receiving computing system wants to send back an outgoing message (such as "ututbund") (for example, a response to a local message), the receiving computing system determines whether the interrupted time has been exceeded, and if it has not exceeded the interrupted time , Then express this outward message to the wireless device using the temporarily assigned address. If the wireless device tries to stay connected so that it has the same temporary network address until at least the specified due time, and if the system is still before the specified due time, the receiving computing system uses only the 5 200425691 A temporary network address sends an outward message. Compared to ignoring the outage time, wireless devices are more likely to receive this outward message. If the interruption time has expired, the receiving computing system may wait for the wireless device to connect again, and then send the outgoing message (s). The receiving computing system may also attempt to send the outgoing message (s) to the wireless device using another transmission mechanism that is different from the transmission mechanism that the wireless device would normally use to send the local message back. For example, if Wireless Farm uses UDP over the Internet protocol to send this local message back, it can use the Short Text Message Service (SMS) to return the response. Additional features and advantages of the present invention will be explained in the following description, and part of them will be apparent from the description, or may be learned by the practice of the present invention. The features and advantages of the present invention can be realized and obtained the features and advantages of the present invention through these instruments and equipment in these additional patent application parks and in combination with special instructions. These and other features of the present invention will become more fully apparent from the following description and the scope of patent application of Fu Likou, or as can be learned from the practice of the present invention as explained below. [Embodiment] The principle of the present invention relates to a wireless device, which constructs a message including a failure message that should be interrupted, and transmits the message to a receiving computing system on a communication carrier network. That message will be referred to as a "back-to-local" message because the message is local from the perspective of the receiving computing system. The interruption time should indicate that a receiving computing system that has exceeded the time should not send any outbound messages using temporary network addresses (for example, a response to a local message), 6 200425691 When sending this local message , Assign the temporary network address to the wireless device. The wireless device attempts to stay connected so that the address is retained until the due time has expired. When the outgoing message is ready to be returned, if the interruption time has not yet elapsed, the outgoing message is sent to the wireless device, which uses the same network address that the wireless device had when sending the local message. Otherwise, if the due time is exceeded ', the receiving computing system does not attempt to use the outbound message transmission of that network address. Instead, the receiving computing system can wait for the next connection from the wireless device, or it can attempt to send out messages using another selected transmission mechanism. Embodiments within the scope of the present invention include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. In this way, computer-readable media can be any available media that can be accessed by a general-purpose or special-purpose computer. By way of example and not limitation, such computer-readable media can include physical computer-readable media such as random access memory (RAM), read-only access memory (r0M), electronic_ erasable Programmable read-only memory (EEPROM), CD-ROM, or other optical disk storage, disk storage, or other magnetic storage device, or any other form of computer-executable instructions or data structures To play or store other media on which the desired code device is stored, and any other media that can be accessed by a general-purpose or special-purpose computer. When sending or providing information to a computer over a network or another communication connection (either hard-wired, wireless, or a combination of hard-wired or wireless), the computer appropriately routes the connection Think of it as a computer-readable medium. Therefore, any such connection is appropriately named a computer-readable medium. The combination described above should also be included within the scope of 7 computer-readable media. Computer-executable instructions include, for example, any instructions and information that cause a general-purpose computer, a special-purpose computer, or a special-purpose processing device to perform a certain function or group of functions. Computer-executable instructions may be, for example, binary, centered formats such as combinatorial languages, or even source code. Figure 1 and the following chronology attempt to provide a short, general description of a suitable computing environment in which the present invention may be implemented. Although not necessary, the invention will be described in the general environmental conditions of instructions executed by a computer, such as a program module, which is executed by a computer system. Generally, program modules include routines, procedures, objects, components, data structures, and so on, which perform specific tasks or implement specific types of abstract data. Computer-executable instructions associated with data structures, and these program modules represent examples of code devices for performing the method actions disclosed herein. With regard to Figure 1, a suitable operating environment for the principles of the present invention includes a general purpose computer system in the form of a computer system 100. Computer system 100 may be, for example, a personal computer that has been adapted to perform the operations disclosed herein. The computer system 100 includes a user input interface 170 that receives information from an input device, such as, for example, a keyboard, microphone, mouse, or example of a mobile device, a touch pad. An input device can be coupled to the user input interface 17 so that information is registered. An input device can send information on such a coupling in response to pre-programmed data from the input device or user manipulation. The computer system 100 includes a video output interface 150, which provides a video output signal to an external video 8 200425691 frequency display device. The computer system 100 may be integrated with or separated from a video display device, such as, for example, a color or monochrome computer monitor. A video display device can be coupled to the video output interface 150 so as to receive a provided video output signal. In the example of a mobile device, the video output interface may be a relatively small display interface. Similarly, the computer system 100 includes an audio output interface 13, which provides an audio output signal to an external audio output device. The computer system 00 may also be integrated with or separated from an audio system, which is a loudspeaker or other device that can include sound data. An audio system can be coupled to the audio output interface 130 to receive a provided audio output signal. The computer system 100 includes a processing unit 120, which considers the complexity and flexibility of the implementation of a computer designed to implement the features of the present invention. Processing units which are also interconnected include system memory and general-purpose processing capabilities. The processing unit executes instructions to implement the computer system 100, the package 1 20 is coupled to the system bus 11 0, and various other components of 140
系統 非揮發性的記憶體, 而’在電腦系統100 是不重要的。程式碼 或更多的程式模組。 統141、一或更多的 程式資料144。 9 200425691 電腦系統100也可包括大量儲存界面160,雖 話或PDAs —般沒有大量儲存裝置。大量儲存界1 夠從大量儲存裝置讀取資料和/或寫入資料到大 置,例如一磁碟或光碟。能夠使一大量儲存裝置與 界面1 60耦接以致於使能夠讀取和寫入資料。當 存裝置與大量儲存界面160耦接時,可在大量儲存 存一或更多的程式模組包括作業系統141、應用卷 其他程式模組143和程式資料144。 電腦系統1 〇〇是可連接於網路,例如一整個辦 整個企業的電腦網路、内部網路和/或網際網路。 1〇〇包括網路界面180 ,透過電腦系統1〇〇從外部 資料和/或將資料傳給外部來源。電腦系統1〇〇可 源父換資料,例如在這樣的一網路上之遠程處理丨 或資料庫。 當第1圖說明可實作本發明的原理之一計算 例子,含有合適組態的任何計算系統可實作本發明 在描述中和專利申請範圍中,將一“計算系統,,廣 任何硬體元件或些元件能夠使用軟體以執行一或 能。計算系統的例子包括桌上型電腦、膝上型電腦 位助理(PDAs)、電話,或任何具有處理能力的其他 置。 第2圖說明一網路環境2〇〇,其包括在一通訊 220上通訊的一無線裝置21〇和一接收計算系統 線裝置210也許是任何能夠在無線網路上通訊的身 然行動電 6 160 能 量儲存裝 大量儲存 一大量儲 裝置中儲 L 式 142、 公室的或 電腦系統 來源接收 與外部來 系統和/ 系統的'一 的特點。 泛定義為 更多的功 、個人數 系統或裝 載波網路 230。無 t置(是否 10 200425691 相同的無線裝置210也能夠在一連線的網路上通訊)。無線 裝置210也許是’例如’一膝上型電腦、個人數位助理(PDAs) 或一電話,且關於電腦系統丨〇〇而言其通常可如上所描述來 架構。 接收計算系統230也許是一代理計算系統,其服務許多 無線裝置連接或可連接到一通訊載波網路220。接收計算 系統230對電腦I20而言也可被架構成如上所描述。在一 般情況下,然而,因無線裝置經常是行動的,這無線裝置 2 1 0也許比接收計算系統230更小,雖然這需求不是必要。 接收計算系統230或許是另一無線裝置或另一計算系統,其 不一定關聯於或由任何特定通訊載波所管理。 置之應中斷時間,所以防止對此要求的一回應之可能誤導 由於與無線裝置之一先前位址的一非關聯性。在第2圖 網路環境200中可執行方法300。於是,經常參考第2 的網路環境200將描述第3圖的方法3〇〇。 由接收計算系統230執行方法3〇〇的 本 ,.B 的一步驟和幾個動 如在開頭“接收計算系統,,之 千丨昂J圖的左縱列所 ^由無線裝置210執行方法300的i ^ ^ 1 > “ 線梦番” 他動作如在開頭“ 衣置 之下第3圖的右縱列所表示。 無線裝置2 1 0建構一訊息,其包括 中斷時丹包括至少間接地表示一 時間(動作301)之一資料攔位。例 線裴晉0Λ 例如,參考第2圖, 2 1 〇將一回本地訊息24〇 這訊* 4 4 1 5亥接收計算系統23( %、包括至少間接地表示一應 應中斷時間之一資料攔 11 200425691 川。應t斷時間是—時間在其之後該訊息(或就那個而言任 何其他向外的訊息)的一回應不該快遞到這無線裝置,這無 線裝置使關聯於應t斷時間之制時性㈣位址。資料搁 位241可清楚地列出應中斷時間,或接收計算系統可使用— 時間或其他資料以得到應中斷時間。或者,資料攔位241也 許根本不存在(或也許是空的)的情況,冑_斷_也許是由 接收計算系統決定之-預設的應中斷時間。應中斷時間可 由’例如,接收-後續的訊息來延伸,該後續的訊息指示 一延伸之應中斷時間。 無線裝置對通訊載波網路建立一連線(動作3〇2)。無 線裝置可在建構回本地訊息的動作之前、之後或同時的任一 者建立這連線(動作3〇1)β於是,為了表示在連線的建立和 回本地訊息的建構之間缺少時間的相關性,如平行地說明動 作 301 和 302 。 一旦建構這回本地訊息,並且在建立對通訊載波網路的 一連線之後(若已經建立一連線),無線裝置在通訊载波網路 上將运回本地訊息快遞到此接收計算系統(動作3 〇3)。由第 2圖中具有數字“丨,,的箭頭242表示這快遞。可由任何 可能機制包括,例如一無連線或連線導向的協定。一般無 連線的協定可包括,例如使用者資料訊息協定(UDp)或無線 應用協定(WAP)。一連線導向的協定可包括,例如傳輸控制 協定(TCP)。儘管無連線的協定和連線導向的協定兩者對 通訊載波網路220皆需要連線,無連線的協定不需要為了完 成傳輸在無線裝置和接收計算系統之間的一分別的連線。 12 200425691 一旦快遞這訊息,無線裝置維持此連線從 快遞到接收計算系統的時候直到至少該應今 304)。 在這連線時候的期間,無線裝置將具 的一已指派的網路位址。此位址將持續直到將 通訊載波網路斷開,或者在一些其他事件的發 公共交換數據網路(PSDN)的改變。在判定為 斷時間之後(動作305),這無線裝置可對通訊 已建立的連線(動作306)。 從接收計算系統的觀點,此接收計算系統 路上從無線裝置中接收此回本地的訊息(動作 若無線裝置仍然準備接收這向外的訊息,接收 出一向外的訊息執行一功能的、結果導向 3 12)。這功能的、結果導向的步驟為了完成這 應的動作。然而,在第3圖所說明的實施例中 括對應的動作3 1 3、3 1 4和3 1 5。 更尤其是,當想要送出一向外的訊息時, 統識別一無線裝置之應中斷時間(動作313)。 料欄位24i包括這應_斷時間之一表示,則應 讀取此資料攔位241來識別。另一方面,若 包括一時間或其他資料片段,應中斷時間可使 則而從其中得到,此接收計算系統可由讀取該 據這些衍生規則而識別該應中斷時間。如果 是空的或者不提供,則此接收計算系統可判定 之預设的應中斷時間。此應中斷時間也可由收 至少將這訊息 斷時間(動作 有一臨時性質 這無線裝置與 生上,例如一 已經超過應中 載波網路中斷 在通訊載波網 3 11)。此時僅 計算系統對送 的步驟(動作 目包括任何對 ,步驟312包 此接收計算系 例如, 若資 中斷時間可由 資料攔位241 用一套衍生規 資料攔位及依 資料攔位241 要運用一預定 到一後續的訊 13 200425691 息而延伸,該延蚀 ..^ 的應中斷時間可從具有另一資料攔位之後 續的訊心直接讀取或得到。 在送出這向外ό 的訊μ之前,此接收計算系統判定是否超 過應中斷時間(動作3 ^ )。右尚未超過應中斷時間(動作314 中的(否)),則此接收古+董& 叹冲算系統將向外的訊息快遞到使用臨 時性所指定的位址之無線裝置(動作3 ! 5 ),從而完成這功能 的,〇果導向的步驟312。無線裝置會接收到這向外的訊息 (例如回本地訊息的回應)大概一段時間,但同時仍然保 持與通訊載波網路連線(動作3〇7)。例如’參考第2圖,接 收计算系統2 3 0將第二訊息2 5 〇回傳到如具有以數字“ 2,, 才示示的箭頭243表示之無線裝置21〇。 若已經超過應中斷時間(動作3丨4中的(是)),則接收計 算系統將不把向外的訊息送至無線裝置,該無線裝置使用在 送出這回本地訊息的時候所具有的臨時性被指定之位址。而 是’接收計算系統可做幾件事情之一者。 若這向外的訊息是對回本地訊息的一回應,則另一選擇 為僅放棄這向外的訊息以及移除任何有關於回本地訊息的 狀態資訊。 另一選擇若這向外的訊息是對回本地訊息的一回應要 保持相關於回本地訊息之狀態資訊’當接收計算系統從相同 的無線裝置再一次接收一通信時,然送出此向外的訊息(動 作3 1 7)。這次,然而,此通信可指示無線裝置具有另一指 定的位址。使用那指定的位址來送出此回應(動作3 1 8)。 又另一選擇,甚至在應中斷時間期滿之後,能快遞這向 14 200425691 外 計 如 傳 權 訊 式 類 到 如 訊 通 存 定 時 網 通 會 收 的訊息,使用除了慣常將這回本地訊息從無線裝置至接收 算系統通訊的傳輸以外的另一選擇傳輸(動作3丨6)。例 ,若使用UDP快遞這原始回本地訊息,則可使用sms回 此回應。 實作运些選擇中的哪個可取決於此關聯訊息的一優先 。例如,若超過應中斷時間,低優先權的一訊息可導致對 訊息完全放棄的一回應。即使已經超過應中斷時間,若一 息是較咼的優先權,可使用另一選擇通信的機制以適時方 回傳一回應。 Λ息240也許是可在無線通訊載波網路上通訊的任何 型的说息。此外,資料攔位24 1可在訊息之内任何地方找 並且資料攔位24 1是由一協定堆疊的任何層可解釋的。例 ,資料攔位也許疋一攔位預先未定的或附加於一關聯的通 協定數據單元(PDU)作為從而由協定堆疊中的網際網路 訊協定層可解釋的。或者,資料欄位24丨可在一簡易物件 取協定(SOAP)封套的標題或本文攔位之内找到以從由協 堆疊中的一應用層可解釋的。 於是’當在通訊載波網路上通訊或者使用一無線裝置 ’本發明的原理斟酌改進的效率。尤其是,當在通訊載波 路上從一無線裝置送出一回本地訊息時,即使無線裝置與 訊載波網路已經分開,減少將送出一隨後向外訊息之機 。此外’也減少可由沒送出這回本地訊息的一無線裝置接 一誤導向外的訊息之機會。 總是有一機會為這無線裝置可重新指派一位址或甚至 15 在應中斷時間期 用者正在旅行,^ 路失去這連線。 從而強制執行一 在這些例-有收到一或更多 的重新指派,且$ 功維持一連線直 者疋块導一回應 本發明的原 訊載波網路上的 求時,無線裝置Έ 連線著。另一方 置可能想要一維 約接下的五分鐘 栽波網路有多久 以及其他的環境 甚至可考慮 如,如果在尖峰a 傾向較短之應中I 者具有保留對目 分鐘量中之重要日 骏置可為了便利1 本發明可以. 滿之則可能斷開。例如,如當無線裝置的使 失線袭置可僅通過一隧道從而對通訊載波網The system is non-volatile memory, and it ’s not important in computer system 100. Code or more program modules. System 141, one or more program data 144. 9 200425691 The computer system 100 may also include a mass storage interface 160, although there are generally no mass storage devices or PDAs. Mass storage sector1 is sufficient to read data from and / or write data to mass storage devices, such as a magnetic disk or optical disc. A large number of storage devices can be coupled to the interface 160 so that data can be read and written. When the storage device is coupled to the mass storage interface 160, one or more program modules may be stored in the mass storage including the operating system 141, application volume other program modules 143, and program data 144. The computer system 100 can be connected to a network, such as a computer network, an internal network, and / or the Internet of an entire enterprise. 100 includes a network interface 180 for transmitting external data through a computer system 100 and / or transmitting data to an external source. The computer system 100 can change data from the source, such as remote processing on a network or a database. When Figure 1 illustrates a calculation example that can implement one of the principles of the present invention, any computing system containing a suitable configuration can be implemented in the present invention. In the description and the scope of the patent application, a "computing system," which can be used on any hardware The component or components can use software to perform one or more functions. Examples of computing systems include desktop computers, laptop computer assistants (PDAs), telephones, or any other device with processing capabilities. Figure 2 illustrates a network Road environment 2000, which includes a wireless device 21 communicating on a communication 220 and a receiving computing system line device 210 may be any physical mobile phone capable of communicating on a wireless network. 6 160 A large number of storage devices store L-142, office or computer system source receiving and external system and / or system's characteristics. Broadly defined as more work, personal number system or load wave network 230. No t Device (whether 10 200425691 the same wireless device 210 can also communicate on a connected network). The wireless device 210 may be 'for example' a laptop, personal digital Assistants (PDAs) or telephones, and with respect to computer systems, they can generally be structured as described above. The receiving computing system 230 may be a proxy computing system that serves many wireless device connections or can be connected to a communication carrier Network 220. The receiving computing system 230 can also be configured for the computer I20 as described above. In general, however, because wireless devices are often mobile, this wireless device 2 1 0 may be more than the receiving computing system 230 Small, although this requirement is not necessary. The receiving computing system 230 may be another wireless device or another computing system, which is not necessarily associated with or managed by any particular communication carrier. It should be interrupted in time, so prevent this requirement The response may be misleading due to a non-association with a previous address of one of the wireless devices. The method 300 may be performed in the network environment 200 of FIG. 2. Therefore, referring to the network environment 200 of FIG. Method 300. The receiving computing system 230 executes one step of Method 300, .B and several actions as in the beginning "Receiving Computing System, thousands of丨 The left column of the Ang J figure ^^^ 1 of the method 300 executed by the wireless device 210 > "Line Dream Fan", his action is as shown in the right "column of Figure 3 below the opening". Wireless Device 2 10 constructs a message, which includes a data block at least indirectly representing a time (action 301) when interrupted. Routine Pei Jin 0Λ For example, referring to Figure 2, 2 1 0 will return a local message 24〇This news * 4 4 1 5 Receiving computing system 23 (%, including at least indirectly indicating one of the data should be one of the interruption time 11 200425691 Sichuan. The response time is-time after this message (or just A response to that of any other outgoing message) should not be delivered to the wireless device, which wireless device is associated with the time-of-day address of the off-time. The data shelf 241 may clearly list the time of the interruption, or the receiving computing system may use the time or other information to obtain the time of the interruption. Alternatively, the data block 241 may not exist at all (or it may be empty), and 胄 _ 断 _ may be determined by the receiving computing system-a preset interruption time. The interruption time can be extended by, for example, a receive-subsequent message indicating an extended interruption time. The wireless device establishes a connection to the communication carrier network (action 302). The wireless device can establish this connection before, after, or at the same time as the action of constructing the local message (Act 3) β. Therefore, in order to indicate the lack of time between the establishment of the connection and the construct of the local message, Relevance, such as illustrating actions 301 and 302 in parallel. Once this local message is constructed, and after a connection to the communication carrier network is established (if a connection has been established), the wireless device sends the local message back to the receiving computing system on the communication carrier network (action 3 〇3). This courier is represented by the arrow 242 with the numbers "丨," in Figure 2. It can be included by any possible mechanism, such as a connectionless or connection-oriented protocol. A general connectionless protocol can include, for example, user data messages Protocol (UDp) or Wireless Application Protocol (WAP). A connection-oriented protocol may include, for example, Transmission Control Protocol (TCP). Although both the connectionless protocol and the connection-oriented protocol apply to the communication carrier network 220, A connection is required, and a connectionless protocol does not require a separate connection between the wireless device and the receiving computing system in order to complete the transmission. 12 200425691 Once the message is delivered, the wireless device maintains this connection from the delivery to the receiving computing system. The time should be at least 304). During this connection time, the wireless device will have an assigned network address. This address will continue until the communication carrier network is disconnected, or in some other event Send a change to the public switched data network (PSDN). After determining the disconnection time (act 305), the wireless device can establish a connection to the communication (act 306). From the perspective of the computing system, the receiving computing system receives this local message from the wireless device on the way (if the wireless device is still ready to receive this outward message, it receives an outward message to perform a function, and results-oriented 3 12) This functional, result-oriented step is intended to accomplish this action. However, the corresponding actions 3 1 3, 3 1 4 and 3 1 5 are included in the embodiment illustrated in Figure 3. More particularly, when thinking To send an outbound message, the system generally identifies the time when the wireless device should be interrupted (action 313). The material field 24i includes one of the time periods when the time should be interrupted, and the data block 241 should be read to identify. On the other hand, if a time or other piece of data is included, the interruption time can be obtained from it. The receiving computing system can identify the interruption time by reading the derived rules. If it is empty or not provided, then The receiving computing system can determine the preset interruption time. This interruption time can also be at least the message interruption time (the action has a temporary nature. If one has exceeded the interruption of the carrier network in the communication carrier network 3 11). At this time, only calculate the system's sending steps (the action includes any pair, step 312 includes the receiving calculation system. For example, if the data interruption time can be stopped by the data 241 Use a set of derivative data to block data and block it according to the data. 241 To extend from a scheduled to a follow-up message 13 200425691, the delay time of the delayed erosion .. ^ can be from a follow-up with another data block. The reading heart directly reads or obtains it. Before sending this outward message μ, the receiving computing system determines whether the interruption time should be exceeded (action 3 ^). The right has not exceeded the interruption time (action 314 (No)) ), Then the receiving ancient + Dong & sigh calculation system will deliver the outward message to the wireless device using the temporarily designated address (action 3! 5), so as to complete this function, the 0 fruit-oriented steps 312. The wireless device will receive this outgoing message (such as a response back to the local message) for some time, but at the same time it will still remain connected to the carrier network (action 307). For example, referring to FIG. 2, the receiving computing system 230 sends back the second message 250 to the wireless device 21 indicated by the arrow 243 indicated by the number "2". If it has exceeded the interruption time ( (Yes) in Action 3 丨 4, the receiving computing system will not send the outward message to the wireless device, and the wireless device uses the temporarily assigned address when sending this local message. Rather, the 'receiving computing system can do one of several things. If this outward message is a response to the local message, the other option is to just discard the outward message and remove any information about the local Status information of the message. Another option is that if this outward message is a response to the local message, the status information related to the local message should be maintained. 'When the receiving computing system receives a communication from the same wireless device again, then Send this outward message (action 3 1 7). This time, however, this communication can indicate that the wireless device has another specified address. Use that specified address to send this response (action 3 1 8). Again Another option, even after the expiry of the interruption time, can express this message. 14 200425691 Extra messages such as the right to the information received by Netcom will be used to save the local messages from the wireless device in addition to the usual The transmission to the receiving system communication is another option (action 3 丨 6). For example, if you use UDP to express the original local message, you can use sms to respond to this. The implementation of these choices may depend on Priority is associated with this message. For example, if the interruption time is exceeded, a message with a lower priority can result in a response to a complete abandonment of the message. Even if the interruption time has been exceeded, if a message has a higher priority, it can be used Another mechanism to choose communication is to return a response at the right time. Λ message 240 may be any type of message that can communicate on the wireless communication carrier network. In addition, the data block 24 1 can be found anywhere in the message and The data block 241 is interpretable by any layer of a protocol stack. For example, the data block may be a block in advance or attached to an associated association Data Units (PDUs) are interpreted by the Internet Protocol layer in the protocol stack. Alternatively, data field 24 丨 can be found within the title of a Simple Object Access Protocol (SOAP) envelope or within the text box. It can be explained from an application layer in the stack. Therefore, 'when communicating on a communication carrier network or using a wireless device', the principles of the present invention consider improved efficiency. In particular, when sending from a wireless device on a communication carrier path When returning a local message, even if the wireless device is separated from the carrier network, it will reduce the chance of sending a subsequent outgoing message. In addition, it will also reduce the number of misdirected messages that can be received by a wireless device that did not send the local message There is always a chance that the wireless device can be reassigned a location or even 15 during the time period that the user should be traveling, and the connection is lost. In order to enforce a wireless device in these cases-there is one or more reassignments received, and $ work is maintained to maintain a connection, a wireless device responds to a request on the original carrier network of the present invention. With. The other party may want to consider how long the five-minute planting wave network will be connected in one dimension and other circumstances. For example, if the spike a tends to be shorter, the one who has the retention is important in the minute amount. Sun Jun Chi may be for convenience 1 This invention can be. It may be disconnected when full. For example, when a wireless device is disabled, it can only pass through a tunnel to the communication carrier network.
Xp 一選擇或者此外,無線裝置可改變PSDNs 重新指派的位址。 ^中’方法300可有時仍然導致無線裝置沒 向外的訊息。然而,假定沒有強制執行位址 法線装置在這時期的期間對通訊载波網路成 到應中斷時間期滿,將以片狀送出一回應或 ’有一顯著減少的機會。 理也斯酌無線裝置具有對多久可連線在通 控制。例如’當送出對於更新電子郵件的要 丁'月巨要·蜚 + — 口士·一 γ · ,、有二十秒的一相當短的時間仍 面’右無線裝置是要從事即時傳訊,無線裝 持更長的通信時間,其中應中斷時間持續大 。於疋’’在判定無線裝置將繼續連線著通訊 匕可將在當地執行的網路應用程式之性質 化為因素。 對按照時間的通訊載波網路連線之費用。例 争間的期間連線這無線裝置,應中斷時間可 時間。另一方面,若無線裝置知道這使用 收費期在—平價下已經付款之—固定的 間,並且若目前收費期快要關帳,則無線 的使用者而傾向一較長之應中斷時間。 他形式實施而沒有悖離它的精神或基本 16 200425691 特性。所描述的實施例是要在各個方面視為說明性且不是限 1性。因此,由這些附加的申請專利範圍而非前述的說明來 =出本發明的範圍。所有的變更,其來自在中請專利範圍的 思義及均等範圍之内,都是在它們的範圍所涵蓋。 【圖式簡單說明】 為了描述本發明在上面所述和其他的優點和特點能夠 獲得的方式’參考在附加的圖式中所說明的特定實施例簡 要地在上面描述本發明之一更特定的描述將顯析。了解宫 些圖示僅描繪本發明的一般實施例,所以不是被視為限制: 的範圍,將透過運用此附隨的圖式來以額外的具體性和細節 描述和說明本發明,其中: p 第1圖說明一合適的作業環境作為本發明的原理; 第2圖說明本發明的原理可操作之一合適的網 境;和. & 第3圖為根據本發明的一無線裝置,說明用於強制執 一應中斷時間之一方法的一流程圖。 【元件代表符號簡單說明】 100 電 腦 系 統 110 系 統 匯 流 排 120 處 理 單 元 130 音 訊 輸 出 介面 140 系 統 記 憶體 141 作 業 系 統 142 應 用 程 式 143 程 式 模 組 144 程 式 資 料 150 視 訊 輸 出 介面 17 200425691 160 大 量 儲 存 介 面 170 使 用 者 輸入 界面 180 網 路 介 面 200 網 路 環 境 210 無 線 裝 置 220 通 訊 載 波網 路 230 接 收 計 算 系 統 240 第 一 訊 息 241 應 中 斷 時 間 250 第 二 訊 息As an alternative to XP, or in addition, the wireless device can change the reassigned address of PSDNs. The method 300 may sometimes still cause the wireless device to not send messages. However, assuming that the address normal device is not enforced during this period, the communication carrier network should reach the expiration time of the communication carrier network, and a response will be sent in the form of a chip or there will be a significant reduction of the chance. Lexicon wireless devices have control over how long the line can be connected. For example, 'When sending the main points for updating emails' Yue Ju Yao · 蜚 + — oral · a γ ·, a short period of time of twenty seconds still faced' right wireless device is to engage in instant messaging, wireless Hold longer communication times, where the interruption time should continue to be large. Yu 疋 ’’ is deciding that the wireless device will continue to be connected to the communication device, which can be a factor in the nature of network applications running locally. Charges for time-based communication carrier network connections. For example, to connect to this wireless device during a dispute, you should interrupt the time. On the other hand, if the wireless device knows that the charge period is-fixed at a parity-fixed period, and if the current charge period is about to close the account, the wireless user tends to a longer interruption time. He is formally implemented without departing from its spirit or basic 16 200425691 characteristics. The described embodiments are to be considered in all respects as illustrative and not restrictive. Therefore, the scope of the present invention is determined by these additional patent application scopes rather than the foregoing description. All the changes, which come from the scope and equality of the patent claims, are covered by their scope. [Brief description of the drawings] In order to describe the way in which the present invention described above and other advantages and features can be obtained ', one of the more specific descriptions of the present invention is briefly described above with reference to specific embodiments illustrated in the attached drawings. The description will be revealed. It is understood that these drawings depict only general embodiments of the invention and are not to be considered as limiting: the scope of this invention will be described and illustrated with additional specificity and detail by using this accompanying drawing, where: p Figure 1 illustrates a suitable operating environment as the principle of the present invention; Figure 2 illustrates a suitable network environment in which the principles of the present invention can operate; and & Figure 3 is a wireless device according to the present invention, illustrating the use of A flowchart of a method for forcing a break time. [Simple description of component representative symbols] 100 computer system 110 system bus 120 processing unit 130 audio output interface 140 system memory 141 operating system 142 application program 143 program module 144 program data 150 video output interface 17 200425691 160 mass storage interface 170 use User input interface 180 network interface 200 network environment 210 wireless device 220 communication carrier network 230 receiving computing system 240 first message 241 interruption time 250 second message
1818